Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows10_x64
  • resource
    win10v200217
  • submitted
    09-03-2020 13:28

General

  • Target

    ELITES MARINE SERVICE QUOTATION.exe

  • Size

    434KB

  • MD5

    6b6126b866b820e74a42b6b1723d398e

  • SHA1

    746806d9d8fe73188766036a1e91b3c4d53e50da

  • SHA256

    b9c54e2f12a33bffa9fe36c616438479879feb97669f614cf3ef37f69c1125d1

  • SHA512

    e4164baba1d62de81ce30b4ef3972070ea5c302c555d9276d4b1381ec380bd0b2960f40f80f44944197c593748756b6dbac612f60b07d845af9d4e3b1ad94fed

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    victor77514@yandex.com
  • Password:
    Great@12345

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\ELITES MARINE SERVICE QUOTATION.exe
    "C:\Users\Admin\AppData\Local\Temp\ELITES MARINE SERVICE QUOTATION.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3988

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Collection

Data from Local System

3
T1005

Replay Monitor

Loading Replay Monitor...

Downloads